Videos


Jeff Forristal on the Android Master-Key Vulnerability

When news of the Android master-key vulnerability began leaking out in early July, details were hard to come by, and that was done intentionally. The researchers at Blue Box Security, a mobile-security start-up, had discovered the vulnerability and were planning to disclose the details of the bug in a presentation at the Black Hat USA 2013 conference.


When Gen. Keith Alexander, the director of the National Security Agency and chief of U.S. Cyber Command, agreed to deliver the opening keynote at Black Hat USA 2013, he had no idea that by the time he took the stage many of the NSA’s most secret information-collection programs would be public knowledge, thanks to Edward Snowden.

The Web browser is the primary portal through which the vast majority of connected users access and interact with the Internet. Each browser has its own security and privacy settings and those settings have an enormous impact on the nature of the relationship between users’ data and the services they encounter online. Google’s Chrome browser has extensive, easy to navigate privacy settings that let users manage everything from digital certificates to location tracking to “Do Not Track” requests. In the latest installment of Threatpost’s occasional how-to video series, we look into the ways we can manage Google Chrome privacy settings and security while navigating the web in the Chrome browser.

Five years ago, a pair of security researchers write a book called Exploiting Online Games in which they described a number of ways in which attackers could take advantage of weaknesses in the protection systems for various gaming platforms. Now, with online gaming having emerged as a massive business, other researchers have picked up the ball and begun finding serious flaws. The latest vulnerability to be disclosed is in EA’s Origin online game-delivery system, which researchers from ReVuln have shown can be exploited remotely to run malicious code on users’ machines.